Description
The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows a low-level user to perform the actions with SYSTEM privileges. We found this issue was not resolved in CVE-2023-33226
Published: 2023-11-09
Score: 8 High
EPSS: 1.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

All Network Configuration Manager customers are advised to upgrade to the latest version of the Network Configuration Manager version 2023.4.1

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-44661 The Network Configuration Manager was susceptible to a Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows a low-level user to perform the actions with SYSTEM privileges. We found this issue was not resolved in CVE-2023-33226
History

No history.

Subscriptions

Solarwinds Network Configuration Manager
cve-icon MITRE

Status: PUBLISHED

Assigner: SolarWinds

Published:

Updated: 2024-09-04T13:41:17.792Z

Reserved: 2023-08-08T23:22:08.618Z

Link: CVE-2023-40054

cve-icon Vulnrichment

Updated: 2024-08-02T18:24:54.914Z

cve-icon NVD

Status : Modified

Published: 2023-11-09T15:15:07.910

Modified: 2024-11-21T08:18:36.850

Link: CVE-2023-40054

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses